CROSS-REFERENCE TO RELATED APPLICATION
TECHNICAL FIELD
[0002] The present disclosure relates to the field of communications technology, in particular
to an information processing method, an information processing device and a computer
readable storage medium.
BACKGROUND
[0003] Edge computing enables operators and third-party services to be hosted at access
points close to User Equipment (UE), efficient service delivery is achieved by reducing
end-to-end latency and load on the transport network. Edge computing can be regarded
as a service provided by 3GPP network operators or third-party network providers to
UEs through edge computing networks, which enables cloud computing capabilities and
environments to be utilized by the edge of cellular networks. Since the edge computing
network is generally deployed at the edge of the 3GPP network, the effect on other
application of the UE can be minimized.
[0004] The 5G core network selects the User Plane Function (UPF) close to the UE, and performs
service orientation from the UPF to the local data network through the N6 interface.
This may be based on UE subscription information data, UE location, application function
(AF), or other information and policies or other related business rules. The 5G core
network can expose network information and functions to edge computing application
functions.
[0005] In the related art, the UE accesses the edge computing network for the first time
by interacting with the edge configuration server. However, authorization of UE identity
and access rights is implemented between the UE and the edge enabler server. Therefore,
in this case, any client can apply to the edge enabler server for edge computing service
authorization. In this case, an attacker could exploit the vulnerability of this system
to send a large number of requests, resulting in denial of service attack of the edge
enabler server.
SUMMARY
[0006] An object of the present disclosure is to provide an information processing method,
an information processing device and a computer readable storage medium, so as to
improve the safety of the edge computing service.
[0007] In a first aspect, an embodiment of the present disclosure provides an information
processing method, applied to a first network element, including: obtaining first
authentication information for a terminal; and in the case of determining that authentication
of the terminal is successful according to the first authentication information, sending
information of a second network element to the terminal, so that the terminal obtains
information of a target network element from the second network element, the information
of the target network element is sent by the second network element to the terminal
when edge computing authorization information of the terminal is verified, and the
target network element is used to provide an edge computing service for the terminal.
[0008] In an embodiment of the present disclosure, the obtaining first authentication information
for the terminal includes: obtaining the first authentication information from a unified
data management entity (UDM); wherein, the first authentication information is obtained
after the terminal is authenticated by a third network element located in a 3GPP network
and stored in the UDM; or, the first authentication information is obtained after
the UDM receives an authentication result of the terminal generated by the third network
element located in the 3GPP network and performs verification on edge computing service
capability of the terminal according to the authentication result; or, the first authentication
information is obtained after the terminal is authenticated by a fourth network element
and stored in the UDM, or, the first authentication information is obtained after
the UDM receives an authentication result of the terminal generated by the fourth
network element and performs verification on the edge computing service capability
of the terminal according to the authentication result; or the first authentication
information is obtained after the terminal is authenticated by an authentication network
element in a DN and stored in the UDM or, the first authentication information is
obtained after the UDM receives an authentication result of the terminal generated
by the authentication network element in the DN and performs verification on the edge
computing service capability of the terminal according to the authentication result.
[0009] In an embodiment of the present disclosure, before the obtaining first authentication
information for the terminal, the method further includes: receiving a first request
sent by the terminal, wherein the first request is used for requesting the edge computing
service
[0010] In an embodiment of the present disclosure, the obtaining first authentication information
for the terminal includes: receiving a second request from the terminal; authenticating
the terminal according to the second request, and obtaining the first authentication
information.
[0011] In an embodiment of the present disclosure, after sending information of a second
network element to the terminal, the method further includes: receiving a third request
from the second network element, wherein the third request is used to verify the edge
computing authorization information of the terminal; obtaining a token according to
the third request; and sending the token to the second network element.
[0012] In an embodiment of the present disclosure, before the obtaining the first authentication
information from UDM, the method further includes: performing mutual authentication
with the UDM.
[0013] In a second aspect, an embodiment of the present disclosure provides an information
processing method, applied to a second network element, including: obtaining edge
computing authorization information of a terminal; in the case that the edge computing
authorization information is verified, sending information of a target network element
to the terminal, wherein the target network element is used to provide an edge computing
service for the terminal.
[0014] In an embodiment of the present disclosure, the obtaining edge computing authorization
information of a terminal includes: obtaining a token of the terminal from a UDM;
or, obtaining a stored token; or, obtaining the token of the terminal from a first
network element; wherein, the token indicates that the terminal has the ability to
use the edge computing service.
[0015] In a third aspect, an embodiment of the present disclosure provides an information
processing method, applied to a third network element, wherein the third network element
is provided in a 3GPP network, the method includes: receiving a fourth request from
a terminal, wherein the fourth request is used to indicate to request an edge computing
service; obtaining first authentication information according to the fourth request;
obtaining information of a first network element, and sending the information of the
first network element to the terminal, so that the terminal interacts with the first
network element, and the first network element performs authentication of the terminal
according to the first authentication information.
[0016] In an embodiment of the present disclosure, the obtaining first authentication information
according to the fourth request includes: authenticating the terminal according to
the fourth request to obtain the first authentication information.
[0017] In an embodiment of the present disclosure, after the authenticating the terminal
according to the fourth request to obtain the first authentication information, the
method further includes: sending the first authentication information to a UDM, so
that the UDM generates edge computing authorization information of the terminal.
[0018] In an embodiment of the present disclosure, the obtaining first authentication information
according to the fourth request includes: authenticating the terminal according to
the fourth request, and obtaining an authentication result; sending the authentication
result to the UDM, so that the UDM verifies edge computing capability of the terminal
according to the authentication result and pre-stored edge computing service capability
information of the terminal, obtains the first authentication information, and generates
edge computing authorization information of the terminal. In an embodiment of the
present disclosure, the obtaining the information of the first network element includes:
obtaining the information of the first network element from the UDM.
[0019] In a fourth aspect, an embodiment of the present disclosure provides an information
processing method, applied to a UDM, including: obtaining first authentication information
and edge computing authorization information of a terminal; sending the first authentication
information to a first network element; and sending the edge computing authorization
information to a second network element.
[0020] In an embodiment of the present disclosure, the obtaining first authentication information
and edge computing authorization information of a terminal includes: obtaining an
authentication result of the terminal from a third network element or a fourth network
element, and verifying edge computing capability of the terminal according to the
authentication result and pre-stored edge computing service capability information
of the terminal, obtaining the first authentication information, and generating the
edge computing authorization information of the terminal; or obtaining the first authentication
information of the terminal from the third network element or the fourth network element,
and generating the edge computing authorization information of the terminal; or obtaining
the first authentication information preconfigured in the UDM.
[0021] In an embodiment of the present disclosure, before the sending the authentication
information to the first network element, the method further includes: performing
mutual authentication with the first network element.
[0022] In an embodiment of the present disclosure, the method further incudes: pre-configuring
subscription information of the terminal.
[0023] In a fifth aspect, an embodiment of the present disclosure provides an information
processing method, applied to a terminal, including: obtaining information of a second
network element from a first network element; obtaining information of a target network
element from the second network element according to the information of the second
network element; wherein, the information of the second network element is sent by
the first network element when authentication of the terminal is successful; the information
of the target network element is sent to the terminal when edge calculation authorization
information of the terminal is verified by the second network element. In an embodiment
of the present disclosure, before the obtaining information of a second network element
from a first network element, the method further includes: sending a first request
to the first network element, wherein the first request is used to indicate to request
an edge computing service; or sending a fourth request to a third network element
request, and the fourth request is used to indicate to request the edge computing
service.
[0024] In an embodiment of the present disclosure, the obtaining information of a second
network element from the first network element includes: sending a second request
to the first network element, so that the first network element authenticates the
terminal according to the second request; receiving the information of the second
network element sent by the first network element, wherein the information of the
second network element is sent when the terminal passes the authentication by the
first network element.
[0025] In a sixth aspect, an embodiment of the present disclosure provides an information
processing device, applied to a first network element, including: a first obtaining
module, configured to obtain first authentication information for a terminal; a first
sending module, configured to, in the case of determining that authentication of the
terminal is successful according to the first authentication information, send information
of a second network element to the terminal, so that the terminal obtains information
of a target network element from the second network element, the information of the
target network element is sent by the second network element to the terminal when
edge computing authorization information of the terminal is verified, and the target
network element is used to provide an edge computing service for the terminal.
[0026] In an embodiment of the present disclosure, the first obtaining module is specifically
configured to obtain the first authentication information from a UDM; wherein, the
first authentication information is obtained after the terminal is authenticated by
a third network element located in a 3GPP network and stored in the UDM; or, the first
authentication information is obtained after the UDM receives an authentication result
of the terminal generated by the third network element located in the 3GPP network
and performs verification on edge computing service capability of the terminal according
to the authentication result; or, the first authentication information is obtained
after the terminal is authenticated by a fourth network element and stored in the
UDM, or, the first authentication information is obtained after the UDM receives an
authentication result of the terminal generated by the fourth network element and
performs verification on the edge computing service capability of the terminal according
to the authentication result; or the first authentication information is obtained
after the terminal is authenticated by an authentication network element in a DN and
stored in the UDM or, the first authentication information is obtained after the UDM
receives an authentication result of the terminal generated by the authentication
network element in the DN and performs verification on the edge computing service
capability of the terminal according to the authentication result.
[0027] In a seventh aspect, an embodiment of the present disclosure provides an information
processing device, applied to a second network element, including: a first obtaining
module, configured to obtain edge computing authorization information of a terminal;
a first sending module, configured to, in the case that the edge computing authorization
information is verified, send information of a target network element to the terminal,
wherein the target network element is used to provide an edge computing service for
the terminal.
[0028] In an embodiment of the present disclosure, the first obtaining module is specifically
configured to obtain a token of the terminal from a UDM; or, obtain a stored token;
or, obtain the token of the terminal from a first network element; wherein, the token
indicates that the terminal has the ability to use the edge computing service.
[0029] In an eighth aspect, an embodiment of the present disclosure provides an information
processing device, applied to a third network element, wherein the third network element
is provided in a 3GPP network, including: a receiving module, configured to receive
a fourth request from a terminal, wherein the fourth request is used to indicate to
request an edge computing service; a first obtaining module, configured to obtain
first authentication information according to the fourth request; a second obtaining
module, configured to obtain information of a first network element, and send the
information of the first network element to the terminal, so that the terminal interacts
with the first network element, and the first network element performs authentication
of the terminal according to the first authentication information.
[0030] In an embodiment of the present disclosure, the first obtaining module is specifically
configured to authenticate the terminal according to the fourth request to obtain
the first authentication information.
[0031] In a ninth aspect, an embodiment of the present disclosure provides an information
processing device, applied to UDM, including: a first obtaining module, configured
to obtain first authentication information and edge computing authorization information
of a terminal; a first sending module, configured to send the first authentication
information to a first network element; a second sending module, configured to send
the edge computing authorization information to a second network element.
[0032] In an embodiment of the present disclosure, the first obtaining module is specifically
configured to obtain an authentication result of the terminal from a third network
element or a fourth network element, and verify edge computing capability of the terminal
according to the authentication result and pre-stored edge computing service capability
information of the terminal, obtain the first authentication information, and generating
the edge computing authorization information of the terminal; or obtain the first
authentication information of the terminal from the third network element or the fourth
network element, and generating the edge computing authorization information of the
terminal; or obtain the first authentication information preconfigured in the UDM.
In a tenth aspect, an embodiment of the present disclosure provides an information
processing device, applied to a terminal, including: a first obtaining module, configured
to obtain information of a second network element from a first network element; a
second obtaining module, configured to obtain information of a target network element
from the second network element according to the information of the second network
element; wherein, the information of the second network element is sent by the first
network element when authentication of the terminal is successful; the information
of the target network element is sent to the terminal when edge calculation authorization
information of the terminal is verified by the second network element.
[0033] In an embodiment of the present disclosure, the first obtaining module includes:
a sending submodule, configured to send a second request to the first network element,
so that the first network element authenticates the terminal according to the second
request; a receiving sub-module, configured to receive the information of the second
network element sent by the first network element, wherein the information of the
second network element is sent when the terminal passes the authentication by the
first network element.
[0034] In an eleventh aspect, an embodiment of the present disclosure provides an information
processing device, applied to a first network element, including: a transceiver, a
memory, a processor, and a program stored in the memory and executed by the processor;
wherein the processor is configured to read the program in the memory to perform the
following processes: obtaining first authentication information for a terminal; and
in the case of determining that authentication of the terminal is successful according
to the first authentication information, sending information of a second network element
to the terminal, so that the terminal obtains information of a target network element
from the second network element, the information of the target network element is
sent by the second network element to the terminal when edge computing authorization
information of the terminal is verified, and the target network element is used to
provide an edge computing service for the terminal.
[0035] In an embodiment of the present disclosure, the processor is further configured to
read a program in the memory to perform the following processes: obtaining the first
authentication information from a unified data management entity (UDM); wherein, the
first authentication information is obtained after the terminal is authenticated by
a third network element located in a 3GPP network and stored in the UDM; or, the first
authentication information is obtained after the UDM receives an authentication result
of the terminal generated by the third network element located in the 3GPP network
and performs verification on edge computing service capability of the terminal according
to the authentication result; or, the first authentication information is obtained
after the terminal is authenticated by a fourth network element and stored in the
UDM, or, the first authentication information is obtained after the UDM receives an
authentication result of the terminal generated by the fourth network element and
performs verification on the edge computing service capability of the terminal according
to the authentication result; or the first authentication information is obtained
after the terminal is authenticated by an authentication network element in a DN and
stored in the UDM or, the first authentication information is obtained after the UDM
receives an authentication result of the terminal generated by the authentication
network element in the DN and performs verification on the edge computing service
capability of the terminal according to the authentication result.
[0036] In an embodiment of the present disclosure, the processor is further configured to
read the program in the memory, performing the following processes: receiving a first
request sent by the terminal, wherein the first request is used for requesting the
edge computing service
[0037] In an embodiment of the present disclosure, the processor is further configured to
read the program in the memory to perform the following processes: receiving a second
request from the terminal; authenticating the terminal according to the second request,
and obtaining the first authentication information.
[0038] In an embodiment of the present disclosure, the processor is further configured to
read the program in the memory to perform the following processes: receiving a third
request from the second network element, wherein the third request is used to verify
the edge computing authorization information of the terminal; obtaining a token according
to the third request; and sending the token to the second network element.
[0039] In an embodiment of the present disclosure, the processor is further configured to
read a program in the memory to perform a process of: performing mutual authentication
with the UDM.
[0040] In a twelfth aspect, an embodiment of the present disclosure provides an information
processing device, applied to a second network element, including: a transceiver,
a memory, a processor, and a program stored in the memory and executed by the processor;
wherein the processor is configured to read the program in memory to perform the following
processes: obtaining edge computing authorization information of a terminal; in the
case that the edge computing authorization information is verified, sending information
of a target network element to the terminal, wherein the target network element is
used to provide an edge computing service for the terminal.
[0041] In an embodiment of the present disclosure, the processor is further configured to
read the program in the memory to perform the following processes: obtaining a token
of the terminal from a UDM; or, obtaining a stored token; or, obtaining the token
of the terminal from a first network element; wherein, the token indicates that the
terminal has the ability to use the edge computing service.
[0042] In a thirteenth aspect, an embodiment of the present disclosure provides an information
processing device, applied to a third network element, wherein the third network element
is provided in a 3GPP network, including: a transceiver, a memory, a processor, and
a program stored in the memory and executed by the processor; wherein the processor
is configured to read the program in memory to perform the following processes: receiving
a fourth request from a terminal, wherein the fourth request is used to indicate to
request an edge computing service; obtaining first authentication information according
to the fourth request; obtaining information of a first network element, and sending
the information of the first network element to the terminal, so that the terminal
interacts with the first network element, and the first network element performs authentication
of the terminal according to the first authentication information. In an embodiment
of the present disclosure, the processor is further configured to read the program
in the memory to perform the following processes: authenticating the terminal according
to the fourth request to obtain the first authentication information. In an embodiment
of the present disclosure, the processor is further configured to read the program
in the memory to perform the following processes: sending the first authentication
information to a UDM, so that the UDM generates edge computing authorization information
of the terminal.
[0043] In an embodiment of the present disclosure, the processor is further configured to
read the program in the memory to perform the following: authenticating the terminal
according to the fourth request, and obtaining an authentication result; sending the
authentication result to the UDM, so that the UDM verifies edge computing capability
of the terminal according to the authentication result and pre-stored edge computing
service capability information of the terminal, obtains the first authentication information,
and generates edge computing authorization information of the terminal. In an embodiment
of the present disclosure, the processor is further configured to read the program
in the memory to perform the following processes: obtaining the information of the
first network element from the UDM.
[0044] In a fourteenth aspect, an embodiment of the present disclosure provides an information
processing device, applied to a UDM, including: a transceiver, a memory, a processor,
and a program stored in the memory and executed by the processor; wherein the processor
is configured to read the program in memory to perform the following processes: obtaining
first authentication information and edge computing authorization information of a
terminal; sending the first authentication information to a first network element;
and sending the edge computing authorization information to a second network element.
[0045] In an embodiment of the present disclosure, the processor is further configured to
read the program in the memory to perform the following processes: obtaining an authentication
result of the terminal from a third network element or a fourth network element, and
verifying edge computing capability of the terminal according to the authentication
result and pre-stored edge computing service capability information of the terminal,
obtaining the first authentication information, and generating the edge computing
authorization information of the terminal; or obtaining the first authentication information
of the terminal from the third network element or the fourth network element, and
generating the edge computing authorization information of the terminal; or obtaining
the first authentication information preconfigured in the UDM. In an embodiment of
the present disclosure, the processor is further configured to read the program in
the memory to perform the following processes: performing mutual authentication with
the first network element.
[0046] In an embodiment of the present disclosure, the processor is further configured to
read the program in the memory to perform the following processes: pre-configuring
subscription information of the terminal.
[0047] In a sixteenth aspect, an embodiment of the present disclosure provides an information
processing device, applied to a terminal, including: a transceiver, a memory, a processor,
and a program stored in the memory and executed by the processor; wherein the processor
is configured to read the program in memory to perform the following processes: obtaining
information of a second network element from a first network element; obtaining information
of a target network element from the second network element according to the information
of the second network element; wherein, the information of the second network element
is sent by the first network element when authentication of the terminal is successful;
the information of the target network element is sent to the terminal when edge calculation
authorization information of the terminal is verified by the second network element.
[0048] In an embodiment of the present disclosure, the processor is further configured to
read the program in the memory to perform the following processes: sending a first
request to the first network element, wherein the first request is used to indicate
to request an edge computing service; or sending a fourth request to a third network
element request, and the fourth request is used to indicate to request the edge computing
service.
[0049] In an embodiment of the present disclosure, the processor is further configured to
read the program in the memory to perform the following processes: sending a second
request to the first network element, so that the first network element authenticates
the terminal according to the second request; receiving the information of the second
network element sent by the first network element, wherein the information of the
second network element is sent when the terminal passes the authentication by the
first network element.
[0050] In a seventeenth aspect, an embodiment of the present disclosure provides a computer-readable
storage medium for storing a computer program, wherein when the computer program is
executed by a processor, the steps in the method are implemented.
[0051] In the embodiment of the present disclosure, in case of obtaining the authentication
information of the terminal and the authentication information being verified, the
information of the second network element is provided to the terminal, and then the
edge computing service is provided for the terminal. Therefore, by using the solutions
of the embodiments of the present disclosure, denial of service attack on the second
network element can be reduced, thereby improving the security of edge computing services.
BRIEF DESCRIPTION OF THE DRAWINGS
[0052] In order to illustrate the technical solutions of the embodiments of the present
disclosure more clearly, the following briefly introduces the accompanying drawings
used in the description of the embodiments of the present disclosure. Obviously, the
accompanying drawings in the following description are only used for some embodiments
of the present disclosure. For those of ordinary skill in the art, other drawings
can also be obtained from these drawings without creative work.
FIG. 1 is a first flowchart of the information processing method provided by an embodiment
of the present disclosure;
FIG. 2 is a second flowchart of the information processing method provided by the
embodiment of the present disclosure;
FIG. 3 is a third flowchart of an information processing method provided by an embodiment
of the present disclosure;
FIG. 4 is a fourth flowchart of the information processing method provided by the
embodiment of the present disclosure;
FIG. 5 is a fifth flowchart of the information processing method provided by the embodiment
of the present disclosure;
FIG. 6 is a sixth flowchart of the information processing method provided by the embodiment
of the present disclosure;
FIG. 7 is a seventh flowchart of an information processing method provided by an embodiment
of the present disclosure;
FIG. 8 is an eighth flow chart of the information processing method provided by the
embodiment of the present disclosure;
FIG. 9 is a ninth flow chart of the information processing method provided by the
embodiment of the present disclosure;
FIG. 10 is a tenth flow chart of the information processing method provided by the
embodiment of the present disclosure;
FIG. 11 is a first structural diagram of an information processing apparatus provided
by an embodiment of the present disclosure;
FIG. 12 is a second structural diagram of an information processing apparatus provided
by an embodiment of the present disclosure;
FIG. 13 is a third structural diagram of an information processing apparatus provided
by an embodiment of the present disclosure;
FIG. 14 is a fourth structural diagram of an information processing apparatus provided
by an embodiment of the present disclosure;
FIG. 15 is a fifth structural diagram of an information processing apparatus provided
by an embodiment of the present disclosure;
FIG. 16 is a first structural diagram of an information processing device provided
by an embodiment of the present disclosure;
FIG. 17 is a second structural diagram of an information processing device provided
by an embodiment of the present disclosure;
FIG. 18 is a third structural diagram of an information processing device provided
by an embodiment of the present disclosure;
FIG. 19 is a fourth structural diagram of an information processing device provided
by an embodiment of the present disclosure;
FIG. 20 is a fifth structural diagram of an information processing device provided
by an embodiment of the present disclosure.
DETAILED DESCRIPTION
[0053] The technical solutions in the embodiments of the present disclosure will be clearly
and completely described below with reference to the accompanying drawings in the
embodiments of the present disclosure. Obviously, the described embodiments are part
of the embodiments of the present disclosure, but not all of the embodiments. Based
on the embodiments in the present disclosure, all other embodiments obtained by those
of ordinary skill in the art without creative work shall fall within the protection
scope of the present disclosure.
[0054] FIG. 1 is a flowchart of an information processing method provided by an embodiment
of the present disclosure, which is applied to a first network element. The first
network element may be, for example, an edge configuration server. As shown in FIG.
1, the method includes the following steps:
Step 101: Obtaining first authentication information for a terminal.
[0055] Specifically, in this embodiment, the first network element obtains the first authentication
information from the UDM. Wherein, the first authentication information can be obtained
in various ways.
[0056] For example, the first authentication information is obtained after the terminal
is authenticated by a third network element located in the 3GPP network (for example,
it may be an Authentication Server Function (AUSF)) and stored in the UDM or, the
first authentication information is obtained after the UDM receives an authentication
result of the terminal by the third network element located in the 3GPP network and
performs verification on the edge computing service capability of the terminal according
to the authentication result; or, the first authentication information is obtained
after the terminal is authenticated by a fourth network element (for example, it may
be a session management function (SMF)) and is stored in the UDM, or, the first authentication
information is obtained after the UDM receives an authentication result of the terminal
by the fourth network element and performs verification on the edge computing service
capability of the terminal according to the authentication result; or the first authentication
information is obtained after the terminal is authenticated by an authentication network
element in the DN and stored in the UDM or, the first authentication information is
obtained after the UDM receives an authentication result of the terminal by the authentication
network element in the DN and performs verification on the edge computing service
capability of the terminal according to the authentication result.
[0057] Alternatively, in this embodiment, the first network element itself can also obtain
the first authentication information. Specifically, the first network element receives
a second request from the terminal, and then performs authentication on the terminal
according to the second request to obtain the first authentication information.
[0058] Step 102: In the case of determining that the authentication of the terminal is successful
according to the first authentication information, sending information of a second
network element to the terminal, so that the terminal obtains information of a target
network element from the second network element, the information of the target network
element is sent by the second network element to the terminal when edge computing
authorization information of the terminal is verified, and the target network element
is used to provide edge computing services for the terminal.
[0059] The second network element may be, for example, an edge enabler server, and the target
network element may be, for example, an edge application server. The information of
the second network element may be, for example, an address and a name of the second
network element.
[0060] In the embodiment of the present disclosure, in case of obtaining the authentication
information of the terminal and the authentication information being verified, the
information of the second network element is provided to the terminal, and then the
edge computing service is provided for the terminal. Therefore, by using the solutions
of the embodiments of the present disclosure, denial of service attack on the second
network element can be reduced, thereby improving the security of edge computing services.
[0061] On the basis of the foregoing embodiment, before step 101, the method may further
include: receiving a first request sent by the terminal, wherein the first request
is used for requesting an edge computing service.
[0062] In the case that the first network element itself obtains the first authentication
information, after step 102, the method may further include: receiving a third request
from the second network element, wherein the third request is used to authenticate
the edge computing authorization information of the terminal. A token is obtained
according to the third request, and the token is sent to the second network element.
On the basis of the above embodiment, before step 101, in the case of obtaining the
first authentication information from the UDM, the method may further include: performing
mutual authentication with the UDM, thereby further improving security.
[0063] FIG. 2 is a flowchart of an information processing method provided by an embodiment
of the present disclosure. The second network element may be, for example, an edge
enabler server. As shown in FIG. 2, the method includes the following steps:
Step 201: Obtaining edge computing authorization information of a terminal.
[0064] Optionally, in this step, the token of the terminal may be obtained from the UDM;
or the token stored by terminal may be obtained; or the token of the terminal may
be obtained from the first network element; wherein the token indicates that the terminal
has the ability to use edge computing services.
[0065] Step 202: In the case that the edge computing authorization information is verified,
sending information of a target network element to the terminal, wherein the target
network element is used to provide an edge computing service for the terminal.
[0066] The information of the target network element may be, for example, an address and
a name of the target network element.
[0067] In the embodiment of the present disclosure, the authentication information of the
terminal is obtained, and only when the authentication information is verified, the
information of the second network element is provided to the terminal, and then the
edge computing service is provided for the terminal. Therefore, by using the solutions
of the embodiments of the present disclosure, denial of service attack on the second
network element can be reduced, thereby improving the security of edge computing services.
[0068] FIG. 3 is a flowchart of an information processing method provided by an embodiment
of the present disclosure. The third network element is provided in a 3GPP network,
and may be, for example, an AUSF. As shown in Figure 3, the method includes the following
steps:
Step 301: Receiving a fourth request from a terminal, wherein the fourth request is
used to indicate to request an edge computing service.
[0069] Step 302: Obtaining first authentication information according to the fourth request.
[0070] In this embodiment of the present disclosure, the terminal may be authenticated according
to the fourth request to obtain the first authentication information. After this step,
the method may further include: sending the first authentication information to the
UDM, so that the UDM generates edge computing authorization information of the terminal.
[0071] Alternatively, in this step, the terminal may also be authenticated according to
the fourth request to obtain an authentication result, and the authentication result
may be sent to the UDM, so that the UDM can verify the edge computing capability of
the terminal according to the authentication result and the pre-stored edge computing
service capability information of the terminal, obtain the first authentication information,
and generate edge computing authorization information of the terminal.
[0072] Step 303: obtaining information of the first network element, and sending the information
of the first network element to the terminal, so that the terminal interacts with
the first network element, and the first network element performs authentication of
the terminal according to the first authentication information.
[0073] Specifically, in this step, the information of the first network element is obtained
from the UDM.
[0074] In the embodiment of the present disclosure, the authentication information of the
terminal is obtained, and only when the authentication information is verified, the
information of the second network element is provided to the terminal, and then the
edge computing service is provided for the terminal. Therefore, by using the solutions
of the embodiments of the present disclosure, denial of service attack on the second
network element can be reduced, thereby improving the security of edge computing services.
[0075] FIG. 4 is a flowchart of an information processing method provided by an embodiment
of the present disclosure, which is applied to UDM. As shown in FIG. 4, the method
includes the following steps:
Step 401: Obtaining first authentication information of a terminal and edge computing
authorization information.
[0076] Specifically, in this step, the authentication result of the terminal can be obtained
from the third network element or the fourth network element, and the edge computer
capability of the terminal can be verified according to the authentication result
and the pre-stored edge computing service capability information of the terminal,
to obtain the first authentication information, and generate the edge computing authorization
information of the terminal; or the first authentication information of the terminal
is obtained from the third network element or the fourth network element, and the
edge computing authorization information of the terminal is generated; or the first
authentication information preconfigured in the UDM is obtained.
[0077] Step 402: Sending the authentication information to the first network element.
[0078] Step 403: Sending the edge computing authorization information to the second network
element.
[0079] In the embodiment of the present disclosure, the authentication information of the
terminal is obtained, and only when the authentication information is verified, the
information of the second network element is provided to the terminal, and then the
edge computing service is provided for the terminal. Therefore, by using the solutions
of the embodiments of the present disclosure, denial of service attack on the second
network element can be reduced, thereby improving the security of edge computing services.
[0080] In the embodiment shown in FIG. 4, before step 402, mutual authentication with the
first network element may also be included, so as to further improve the security.
Wherein, the subscription information of the terminal may also be preconfigured in
the UDM.
[0081] FIG. 5 is a flowchart of an information processing method provided by an embodiment
of the present disclosure, which is applied to a terminal. As shown in FIG. 5, the
method includes the following steps:
Step 501: obtaining information of a second network element from a first network element.
[0082] Specifically, in this step, the terminal sends a second request to the first network
element, so that the first network element performs authentication on the terminal
according to the second request. Afterwards, the terminal receives the information
of the second network element sent by the first network element, wherein the information
of the second network element is sent when the terminal passes the authentication
by the first network element.
[0083] Before this step, the method may further include: sending, by the terminal, a first
request to the first network element, wherein the first request is used to indicate
to request an edge computing service; or, the terminal sends a fourth request to a
third network element, the fourth request is used to indicate to request an edge computing
service.
[0084] Step 502: obtaining information of a target network element from the second network
element according to the information of the second network element.
[0085] The information of the second network element is sent by the first network element
when the authentication of the terminal is successful; the information of the target
network element is sent to the terminal when the edge calculation authorization information
of the terminal is verified by the second network element.
[0086] In the embodiment of the present disclosure, the authentication information of the
terminal is obtained, and only when the authentication information is verified, the
information of the second network element is provided to the terminal, and then the
edge computing service is provided for the terminal. Therefore, by using the solutions
of the embodiments of the present disclosure, a denial of service attack on the second
network element can be reduced, thereby improving the security of edge computing services.
[0087] In the related art, the UE accesses the edge computing network for the first time
by interacting with the edge configuration server. However, in the initial access
process, the authorization of the UE identity and access authority is not implemented,
but the service authorization is performed between the UE and the edge enabler server.
The disadvantage of this design is that any client can apply to the edge enabler server
for edge computing service authorization. Then, an attacker could exploit the vulnerability
of this system to send a large number of requests, resulting in a denial of service
attack on the edge enabler server.
[0088] In addition, for the edge configuration server, the Authentication Authorization
Function (AAF) and the relationship between the 3GPP network and the edge computing
network have unreasonable or unclear factors in the related art. Specifically, the
position of the AAF as the authentication server is not clear, because there is no
such network function in the architecture of the related art; secondly, the edge configuration
server is currently between the edge computing network and the 3GPP network, and has
no relationship with these two networks, cannot perform the configuration of the UE.
[0089] In the embodiment of the present disclosure, an information processing method is
provided, so as to realize the authentication and authorization of the UE, and at
the same time, the specific location of the edge configuration server is specified.
[0090] In one embodiment, the edge configuration server is provided in the edge computing
network. Specifically: when the UE accesses the edge computing data network, authentication
is achieved through the 3GPP network; when the UE accesses the edge computing network,
the edge configuration server confirms the legitimacy of the UE identity by using
the authentication information of the UE obtained from the 3GPP network.
[0091] The UE carries the edge computing service request in a registration request, and
the 3GPP network completes the authentication of the UE. After that, the 3GPP network
will store the authentication information for the edge computing service of the UE
in the UDM. Of course, the edge computing service capability information of the UE
may also be pre-configured in the UDM in an out-of-band manner. After the 3GPP network
performs the authentication of the UE, the information of the edge configuration server
is sent to the UE, so that the UE accesses the edge configuration server. When the
edge configuration server receives the edge computing request from a user, the authentication
information of the UE is obtained and verified, and then the information of the edge
enabled server is returned. After that, the edge enabler server requests the UDM for
edge computing service authorization information of the UE.
[0092] In one embodiment, the edge configuration server may be provided in a 3GPP operator
network or a data network (DN). Specifically: the UE accesses the edge computing data
network to achieve authentication through the 3GPP network, and can be further authorized
by the DN data network. When the UE accesses the edge computing network, the edge
configuration server (which can be the server of the DN data network) will confirm
the legitimacy of the UE identity by using the authentication information of the UE
obtained from the 3GPP network.
[0093] If the UE accesses the DN data network, the UE can provide secondary authentication
for the UE, and the DN network can provide edge computing services. When the edge
configuration server receives the edge computing request from a user, the edge computing
server requests the edge computing service authentication information of the UE from
the authentication, authorization, and accounting (AAA) of the DN network or the UDM.
[0094] In this case, the edge configuration server can combine the function of edge computing
authentication with the edge computing authentication service.
[0095] In one embodiment, after the UE obtains the authentication information of the edge
configuration server, the UE completes the authentication when initially establishing
a connection with the edge configuration server. Authentication can be achieved through
Transport Layer Security (TLS) or Network Data Service (NDS) or Extensible Authentication
Protocol (EAP) authentication protocol at the transport layer, and the authentication
is implemented through 3GPP network to instruct to implement optional secondary authentication.
[0096] Hereinafter, the implementation process of the information processing method according
to the embodiment of the present disclosure will be described in detail with reference
to different embodiments.
[0097] As shown in FIG. 6, it is a flowchart of an information processing method according
to an embodiment of the present disclosure. In this embodiment, the edge configuration
server belongs to the edge computing network. The edge configuration server performs
the authentication of the UE, and the edge enablement server performs the authorization
of the UE. This embodiment includes the following processes.
[0098] Step 601: The UE initiates a registration request main authentication process to
the 3GPP network, carries a service request of edge computing, and requests to obtain
information of an edge configuration server.
[0099] The 3GPP network completes the authentication of the UE, and the authenticated UE
may have the information of the edge computing configuration server.
[0100] Step 602: After the AUSF and the UE complete the two-way primary authentication,
the AUSF sends the edge computing authorization information of a user to the UDM,
including the edge computing service request of the UE, the UE identity, and information
of the selected edge computing configuration server. The service subscription information
of the edge computing of the user can also be stored in the UDM.
[0101] Step 603: The UDM generates an edge computing authorization token, which identifies
that the user has an ability to use the edge computing service.
[0102] Step 604: the UMD sends edge computing authorization response information to the
AUSF to inform the AUSF that the edge computing authorization information for the
UE has been generated.
[0103] Step 605: The UE sends an initial connection request of the edge computing service
to the edge configuration server through the information of the edge configuration
server sent by the AUSF, and accesses the edge configuration server.
[0104] Step 606: After the edge configuration server receives the request from the UE, the
edge configuration server sends a user authentication information check request to
the UDM, requesting the edge computing service authentication information of the UE.
[0105] Step 607: The UDM returns the edge computing service authentication information of
the UE through the user authentication information response.
[0106] Step 608: The edge configuration server sends an initial connection response of the
edge computing service to the UE, which carries the information of the edge enabler
server.
[0107] Step 609: The UE sends an edge computing service request to the edge computing enabler
server to request the service.
[0108] Step 610: The edge enabler server requests the UDM for edge computing authorization
information, such as a Token, of the UE.
[0109] Step 611: the UDM returns a user authorization information response to the edge enabler
server, and returns a Token.
[0110] Step 612: The edge enabler server sends an edge computing service response to the
UE, that is, sending the information of the edge application server to the UE.
[0111] As shown in FIG. 7, it is a flowchart of an information processing method according
to an embodiment of the present disclosure. In this embodiment, the edge configuration
server belongs to the edge computing network. The service capabilities of edge computing
of the UE are pre-configured in UDM. When the UE registers with the network, the AUSF
will query the UDM. If the query is successful and it is obtained that UE can execute
the edge computing service, the UDM will send a confirmation message to the AUSF.
The AUSF will pass the authentication success or indicate the AMF that the UE has
the edge computing service capability, so that the AUSF or the AMF selects an edge
configuration server and sends the address or information of the server to the UE
through the authentication success message. This embodiment includes the following
processes.
[0112] Step 701: the UE initiates a registration request main authentication process to
a 3GPP network (such as AUSF), carrying a service request for edge computing. The
AUSF completes the authentication of the UE.
[0113] Step 702: The AUSF sends edge computing authorization information to the UDM, requesting
to verify the edge computing capability of the UE.
[0114] Step 703: The UDM verifies the edge computing capability of the UE, and generates
edge computing authentication information, where the authentication information identifies
that the UE has the capability to use the edge computing service. In addition, UDM
generates an authorization token for edge computing.
[0115] Step 704: The UMD sends edge computing authorization response information to the
AUSF or AMF to inform the AUSF or AMF of the information of the edge configuration
server.
[0116] Step 705: If the authentication is successful, the AUSF or AMF returns the information
of the edge configuration server.
[0117] Step 706: The UE sends an initial connection request of the edge computing service
to the edge configuration server through the information of the edge configuration
server sent by the AUSF, and accesses the edge configuration server.
[0118] Step 707: After the edge configuration server receives the request from the UE, the
edge configuration server sends a user authentication information check request to
the UDM, requesting the edge computing service authentication information of the UE.
[0119] Step 708: The UDM returns the edge computing service authentication information of
the UE.
[0120] Step 709: The edge configuration server sends an initial connection response of the
edge computing service to the UE, which carries the information of the edge enabler
server.
[0121] Step 710: The UE sends an edge computing service request to the edge computing enabler
server to request the service.
[0122] Step 711: The edge enabler server requests the UDM for edge computing authorization
information, such as Token, of the UE.
[0123] Step 712: the UDM returns a user authorization information response to the edge enabler
server, and returns a Token.
[0124] Step 713: The edge enabler server sends an edge computing service response to the
UE, that is, sending the information of the edge application server to the UE.
[0125] As shown in FIG. 8, it is a flowchart of an information processing method according
to an embodiment of the present disclosure. In this embodiment, the edge configuration
server is provided in the 3GPP network or the DN network. The edge configuration server
(the entity where the UE accesses the edge computing network for the first time) completes
the authentication, and the enabler server completes the authorization. The edge configuration
server is implemented by entities such as 3GPP network entity (AUSF) or DN data AAA.
In this embodiment, if an independent authentication and authorization function is
set on the edge computing network, the edge enabler server or the AAF needs to perform
steps 806 and 807, so that the edge enabler server or the AAF and the UDM complete
the authentication and authorization of the UE. This embodiment includes the following
processes.
[0126] Step 801: the UE initiates a registration request main authentication process to
the edge configuration server, and the registration request carries a service request
of edge computing.
[0127] The 3GPP network or the DN data network completes the primary authentication and
optional secondary authentication of the UE.
[0128] Step 802: The SMF sends edge computing authentication and authorization information
to the UDM.
[0129] Step 803: An authentication and authorization Token for edge computing is generated
in the UDM, and the Token identifies that the user has the ability to use the edge
computing service.
[0130] Step 804: the UMD sends edge computing authorization response information to the
SMF, notifying that the edge computing authorization information for the UE has been
generated.
[0131] Wherein, steps 801-804 may also refer to the implementation process of 701-704 in
the embodiment shown in FIG. 7.
[0132] Step 805: the information of the edge enabler server is carried in the authentication
success response of the primary authentication or the secondary authentication, and
is sent to the UE.
[0133] Step 806: The UE accesses the edge computing network through the information of the
edge enabler server sent by the operator network, and initiates an edge computing
service request.
[0134] Step 807: After the edge computing enabler server receives the edge computing service
request from the user, the edge computing enabler server requests the UDM for edge
computing service authentication and authorization information of the UE.
[0135] Step 808: the UDM returns a user authorization information response to the edge enabler
server, and returns a Token.
[0136] Step 809: The edge enabler server sends an edge computing service response to the
UE, that is, sending the information of the edge application server to the UE.
[0137] As shown in FIG. 9, it is a flowchart of an information processing method according
to an embodiment of the present disclosure. In this embodiment, the UE performs primary
authentication with the 3GPP network. After the UE initially accesses the edge computing
network, the edge configuration server and the UE perform optional authentication,
and the authentication method may be an authentication method of the transport layer
or an authentication method of the network layer. In this embodiment, the authorization
of the UE by the edge computing network may also adopt the Oauth2.0 authorization
framework of the application layer according to the authentication result of the UE
by the edge configuration server. This embodiment includes the following processes.
[0138] Step 901: the UE initiates a registration request main authentication process to
the 3GPP network, carrying the edge computing service request.
[0139] The UE performs primary authentication with the 3GPP network and obtains the address
of the edge computing configuration service.
[0140] Step 902: the UE sends an edge computing connection request to the edge configuration
server.
[0141] Step 903: The edge configuration server selects an authentication mode to authenticate
the UE.
[0142] The authentication method may be TLS, NDS/IP, EAP-AKA, and the authentication and
key agreement (AKA) and the like.
[0143] Step 904: the edge configuration server performs authentication with the UE, and
after the authentication is successful, the UE obtains the address of the edge enabler
server. Step 905: the UE sends an edge computing service request to the edge enabler
server. Step 906: After the edge enabler server receives the edge computing service
request, the edge enabler server requests the edge configuration server for the edge
computing service authentication and authorization information of the UE.
[0144] Step 907: the edge configuration server calculates the Token.
[0145] Step 908: The edge configuration server sends a user authorization information response
to the edge enabler server, which carries the Token.
[0146] Step 909: The edge enabler server sends an edge computing service response to the
UE, that is, sending the information of the edge application server to the UE.
[0147] As shown in FIG. 10, it is a flowchart of an information processing method according
to an embodiment of the present disclosure. In this embodiment, the subscription information
of the terminal is preconfigured in the UDM.
[0148] This embodiment includes the following processes:
Step 1001: the subscription information of the UE is pre-configured in the UDM.
[0149] Step 1002: the UE and the 3GPP network perform a registration request main authentication
process, and the registration request message carries the edge computing server request.
After completing the main authentication, the UE obtains the information of the edge
computing configuration server.
[0150] Step 1003: the UE sends an initial connection request of the edge computing service
to the edge configuration server.
[0151] The edge configuration server and the UDM perform service function authentication,
so that the UDM and the configuration server perform mutual authentication. Specifically,
it can include the following steps.
[0152] Step 1004: The edge configuration server sends a network function authentication
request to the UDM.
[0153] Step 1005: the UDM sends a network function authentication response to the edge configuration
server.
[0154] Step 1006: After the authentication is completed, the edge configuration server sends
a user authentication information Check request to the UDM, requests the edge computing
service authentication information of the UE, and obtains the edge computing service
authentication information of the UE.
[0155] Step 1007: the UDM returns the edge computing service authentication information
of the UE.
[0156] Step 1008: The edge configuration server stores the edge computing service authentication
information of the UE.
[0157] Step 1009: The edge configuration server sends an initial connection response of
the edge computing service to the UE, which carries the information of the edge enabler
server.
[0158] Step 1010: The UE sends an edge computing service request to the edge computing enabler
server to request the service.
[0159] Step 1011: the edge enabler server sends a user authorization information Check request
to the UDM, requesting the edge computing service authorization information, such
as Token, of the UE.
[0160] Step 1012: the UDM returns a user authorization information response to the edge
enabler server, and returns a Token.
[0161] Step 1013: The edge enabler server sends an edge computing service response to the
UE, that is, sending the information of the edge application server to the UE.
[0162] It can be seen from the above that in the embodiments of the present disclosure,
it is clarified that the authentication logic of the edge computing service UE, the
Dos attack which is caused because the authentication is not performed when UE requests
the edge computing service is avoided.
[0163] The embodiment of the present disclosure further provides an information processing
device, which is applied to a first network element. FIG. 11 is a structural diagram
of an information processing device provided by an embodiment of the present disclosure.
Since the principle of the information processing device for solving the problem is
similar to that of the information processing method in the embodiment of the present
disclosure, the implementation of the information processing device may refer to the
implementation of the method, and the repetition will not be repeated.
[0164] As shown in FIG. 11, the information processing device includes: a first obtaining
module 1101, configured to obtain first authentication information for a terminal;
and a first sending module 1102, configured to, in the case of determining that the
authentication of the terminal is successful according to the first authentication
information, send information of a second network element to the terminal, so that
the terminal obtains information of a target network element from the second network
element, the information of the target network element is sent by the second network
element to the terminal when edge computing authorization information of the terminal
is verified, and the target network element is used to provide edge computing services
for the terminal.
[0165] Optionally, the first obtaining module is specifically configured to obtain the first
authentication information from the UDM;
[0166] Wherein, the first authentication information is obtained after the terminal is authenticated
by a third network element located in the 3GPP network (for example, it may be an
Authentication Server Function (AUSF)) and stored in the UDM or, the first authentication
information is obtained after the UDM receives an authentication result of the terminal
by the third network element located in the 3GPP network and performs verification
on the edge computing service capability of the terminal according to the authentication
result; or, the first authentication information is obtained after the terminal is
authenticated by a fourth network element (for example, it may be a session management
function (SMF)) and is stored in the UDM, or, the first authentication information
is obtained after the UDM receives an authentication result of the terminal by the
fourth network element and performs verification on the edge computing service capability
of the terminal according to the authentication result; or the first authentication
information is obtained after the terminal is authenticated by an authentication network
element in the DN and stored in the UDM or, the first authentication information is
obtained after the UDM receives an authentication result of the terminal by the authentication
network element in the DN and performs verification on the edge computing service
capability of the terminal according to the authentication result.
[0167] Optionally, the device may further include: a first receiving module, configured
to receive a first request sent by the terminal, wherein the first request is used
for requesting an edge computing service.
[0168] Optionally, the first obtaining module 1101 may include: a receiving sub-module,
configured to receive a second request from the terminal; an authentication sub-module,
configured to authenticate the terminal according to the second request, and obtain
the first authentication information.
[0169] Optionally, the device may further include: a second receiving module, configured
to receive a third request from the second network element, wherein the third request
is used to authenticate the edge computing authorization information of the terminal;
a second obtaining module, configured to obtain a token according to the third request;
and a second sending module, configured to send the token to the second network element.
[0170] Optionally, the device may further include: an authentication module configured to
perform mutual authentication with the UDM.
[0171] The device provided by the embodiment of the present disclosure can execute the foregoing
method embodiments, and the implementation principles and technical effects thereof
are similar, and details are not described herein again in this embodiment. The embodiments
of the present disclosure further provide an information processing device, which
is applied to a second network element. FIG. 12 is a structural diagram of an information
processing device provided by an embodiment of the present disclosure. Since the principle
of the information processing device for solving the problem is similar to that of
the information processing method in the embodiment of the present disclosure, the
implementation of the information processing device may refer to the implementation
of the method, and the repetition will not be repeated.
[0172] As shown in FIG. 12, the information processing device includes: a first obtaining
module 1201, configured to obtain edge computing authorization information of a terminal;
a first sending module 1202, configured to, in the case that the edge computing authorization
information is verified, send information of a target network element to the terminal,
wherein the target network element is used to provide an edge computing service for
the terminal.
[0173] Optionally, the first obtaining module 1201 is specifically configured to obtain
a token of the terminal from the UDM; or, obtain a stored token; or, obtain the token
of the terminal from the first network element; wherein, the token indicates that
the terminal has the ability to use edge computing services.
[0174] The device provided by the embodiment of the present disclosure can execute the foregoing
method embodiments, and the implementation principles and technical effects thereof
are similar, and details are not described herein again in this embodiment. An embodiment
of the present disclosure further provides an information processing device, which
is applied to a third network element, where the third network element is provided
in a 3GPP network. FIG. 13 is a structural diagram of an information processing device
provided by an embodiment of the present disclosure. Since the principle of the information
processing device for solving the problem is similar to that of the information processing
method in the embodiment of the present disclosure, the implementation of the information
processing device may refer to the implementation of the method, and the repetition
will not be repeated.
[0175] As shown in FIG. 13, the information processing device includes: a receiving module
1301, configured to receive a fourth request from a terminal, wherein the fourth request
is used to indicate to request an edge computing service; a first obtaining module
1302, configured to obtain first authentication information according to the fourth
request; a second obtaining module 1303, configured to obtain information of the first
network element, and send the information of the first network element to the terminal,
so that the terminal interacts with the first network element, and the first network
element performs authentication of the terminal according to the first authentication
information. Optionally, the first obtaining module 1302 is specifically configured
to authenticate the terminal according to the fourth request to obtain the first authentication
information. Optionally, the device may further include: a first sending module, configured
to send the first authentication information to the UDM, so that the UDM generates
edge computing authorization information of the terminal.
[0176] Optionally, the first obtaining module 1302 may include: an authentication sub-module,
configured to authenticate the terminal according to the fourth request, and obtain
an authentication result; a sending sub-module, configured to send the authentication
result to the UDM, so that the UDM can verify the edge computing capability of the
terminal according to the authentication result and the pre-stored edge computing
service capability information of the terminal, obtain the first authentication information,
and generate edge computing authorization information of the terminal.
[0177] Optionally, the first obtaining module 1302 may be configured to obtain the information
of the first network element from the UDM.
[0178] The device provided by the embodiment of the present disclosure can execute the foregoing
method embodiments, and the implementation principles and technical effects thereof
are similar, and details are not described herein again in this embodiment. The embodiments
of the present disclosure also provide an information processing device, which is
applied to UDM. FIG. 14 is a structural diagram of an information processing device
provided by an embodiment of the present disclosure. Since the principle of the information
processing device for solving the problem is similar to that of the information processing
method in the embodiment of the present disclosure, the implementation of the information
processing device may refer to the implementation of the method, and the repetition
will not be repeated.
[0179] As shown in FIG. 14, the information processing device includes: a first obtaining
module 1401, configured to obtain first authentication information of a terminal and
edge computing authorization information; and a first sending module 1402, configured
to send the authentication information to the first network element; and a second
sending module 1403, configured to send the edge computing authorization information
to the second network element.
[0180] Optionally, the first obtaining module 1401 is specifically configured to obtain
the authentication result of the terminal from the third network element or the fourth
network element, and verify the edge computing capability of the terminal according
to the authentication result and the pre-stored edge computing service capability
information of the terminal, obtain the first authentication information, and generate
the edge computing authorization information of the terminal; or obtain the first
authentication information of the terminal from the third network element or the fourth
network element, and generate edge computing authorization information of the terminal;
or obtain the first authentication information preconfigured in the UDM. Optionally,
the device may further include: an authentication module, configured to perform mutual
authentication with the first network element.
[0181] Optionally, the device may further include: a pre-configuration module, configured
to pre-configure subscription information of the terminal.
[0182] The device provided by the embodiment of the present disclosure can execute the foregoing
method embodiments, and the implementation principles and technical effects thereof
are similar, and details are not described herein again in this embodiment. The embodiments
of the present disclosure also provide an information processing device, which is
applied to a terminal. FIG. 15 is a structural diagram of an information processing
device provided by an embodiment of the present disclosure. Since the principle of
the information processing device for solving the problem is similar to that of the
information processing method in the embodiment of the present disclosure, the implementation
of the information processing device may refer to the implementation of the method,
and the repetition will not be repeated.
[0183] As shown in FIG. 15, the information processing device includes: a first obtaining
module 1501, configured to obtain information of a second network element from a first
network element; and a second obtaining module 1502, configured to obtain information
of a target network element from the second network element according to the information
of the second network element; wherein, the information of the second network element
is sent by the first network element when the authentication of the terminal is successful;
the information of the target network element is sent to the terminal when the edge
calculation authorization information of the terminal is verified by the second network
element.
[0184] Optionally, the first obtaining module 1501 includes: a sending sub-module, configured
to send a second request to the first network element, so that the first network element
authenticates the terminal according to the second request; a receiving sub-module,
configured to receive information of the second network element sent by the first
network element, wherein the information of the second network element is sent when
the terminal passes the authentication by the first network element.
[0185] Optionally, the device may further include: a sending module, configured to send
a first request to the first network element, wherein the first request is used to
indicate to request an edge computing service; or send a fourth request to a third
network element request, and the fourth request is used to indicate to request an
edge computing service. The device provided by the embodiment of the present disclosure
can execute the foregoing method embodiments, and the implementation principles and
technical effects thereof are similar, and details are not described herein again
in this embodiment. As shown in FIG. 16, the information processing device according
to the embodiment of the present disclosure, applied to a first network element, includes:
a processor 1600, configured to read a program in the memory 1620, and perform the
following processes: obtaining first authentication information for a terminal; and
[0186] in the case of determining that the authentication of the terminal is successful
according to the first authentication information, sending information of a second
network element to the terminal, so that the terminal obtains information of a target
network element from the second network element, the information of the target network
element is sent by the second network element to the terminal when edge computing
authorization information of the terminal is verified, and the target network element
is used to provide edge computing services for the terminal.
[0187] The transceiver 1610 is used to receive and send data under the control of the processor
1600.
[0188] In FIG. 16, the bus architecture may include any number of interconnected buses and
bridges, specifically various circuits of one or more processors represented by processor
1600 and memory represented by memory 1620 are linked together. The bus architecture
may also link together various other circuits, such as peripherals, voltage regulators,
and power management circuits, which are well known in the art and, therefore, will
not be described further herein. The bus interface provides the interface. Transceiver
1610 may be a number of elements, including a transmitter and a transceiver, units
for communicating with various other devices over a transmission medium. The processor
1600 is responsible for managing the bus architecture and general processing, and
the memory 1620 may store data used by the processor 1600 in performing operations.
[0189] The processor 1600 is responsible for managing the bus architecture and general processing,
and the memory 1620 may store data used by the processor 1600 in performing operations.
[0190] The processor 1600 is also used to read the program, and execute the following steps:
obtaining the first authentication information from the UDM;
[0191] Wherein, the first authentication information is obtained after the terminal is authenticated
by a third network element located in the 3GPP network and stored in the UDM or, the
first authentication information is obtained after the UDM receives an authentication
result of the terminal by the third network element located in the 3GPP network and
performs verification on the edge computing service capability of the terminal according
to the authentication result; or, the first authentication information is obtained
after the terminal is authenticated by a fourth network element and is stored in the
UDM, or, the first authentication information is obtained after the UDM receives an
authentication result of the terminal by the fourth network element and performs verification
on the edge computing service capability of the terminal according to the authentication
result; or the first authentication information is obtained after the terminal is
authenticated by an authentication network element in the DN and stored in the UDM
or, the first authentication information is obtained after the UDM receives an authentication
result of the terminal by the authentication network element in the DN and performs
verification on the edge computing service capability of the terminal according to
the authentication result.
[0192] The processor 1600 is also used to read the program, and execute the following steps:
receiving a first request sent by the terminal, wherein the first request is used
for requesting an edge computing service.
[0193] The processor 1600 is also used to read the program, and execute the following steps:
receiving a second request from the terminal;
authenticating the terminal according to the second request, and obtaining the first
authentication information.
[0194] The processor 1600 is also used to read the program, and execute the following steps:
receiving a third request from the second network element, wherein the third request
is used to authenticate the edge computing authorization information of the terminal;
obtaining a token according to the third request; and
sending the token to the second network element.
[0195] The processor 1600 is also used to read the program, and execute the following steps:
performing mutual authentication with the UDM.
[0196] The device provided by the embodiment of the present disclosure can execute the foregoing
method embodiments, and the implementation principles and technical effects thereof
are similar, and details are not described herein again in this embodiment. As shown
in FIG. 17, the information processing device according to the embodiment of the present
disclosure, applied to a second network element, includes: a processor 1700, configured
to read a program in the memory 1720, and perform the following processes:
obtaining edge computing authorization information of a terminal;
in the case that the edge computing authorization information is verified, sending
information of a target network element to the terminal, wherein the target network
element is used to provide an edge computing service for the terminal.
[0197] The transceiver 1710 is used to receive and transmit data under the control of the
processor 1700.
[0198] As shown in FIG. 17, the bus architecture may include any number of interconnected
buses and bridges, specifically various circuits of one or more processors represented
by processor 1700 and memory represented by memory 1720 are linked together. The bus
architecture may also link together various other circuits, such as peripherals, voltage
regulators, and power management circuits, which are well known in the art and, therefore,
will not be described further herein. The bus interface provides the interface. Transceiver
1710 may be a number of elements, including a transmitter and a transceiver, units
for communicating with various other devices over a transmission medium. The processor
1700 is responsible for managing the bus architecture and general processing, and
the memory 1720 may store data used by the processor 1700 in performing operations.
[0199] The processor 1700 is responsible for managing the bus architecture and general processing,
and the memory 1720 may store data used by the processor 1700 in performing operations.
[0200] The processor 1700 is also used to read the program, and perform the following steps:
obtaining a token of the terminal from the UDM; or,
obtaining a stored token; or,
obtaining the token of the terminal from the first network element;
wherein, the token indicates that the terminal has the ability to use edge computing
services.
[0201] The device provided by the embodiment of the present disclosure can execute the above
method embodiments, and the implementation principles and technical effects thereof
are similar, and details are not described herein again in this embodiment.
[0202] As shown in FIG. 18, the information processing device according to the embodiment
of the present disclosure, applied to a second network element, includes: a processor
1800, configured to read a program in the memory 1820, and perform the following processes:
receiving a fourth request from a terminal, wherein the fourth request is used to
indicate to request an edge computing service;
obtaining first authentication information according to the fourth request;
obtaining information of the first network element, and sending the information of
the first network element to the terminal, so that the terminal interacts with the
first network element, and the first network element performs authentication of the
terminal according to the first authentication information.
[0203] The transceiver 1810 is used to receive and transmit data under the control of the
processor 1800.
[0204] As shown in FIG. 18, the bus architecture may include any number of interconnected
buses and bridges, specifically various circuits of one or more processors represented
by processor 1800 and memory represented by memory 1820 are linked together. The bus
architecture may also link together various other circuits, such as peripherals, voltage
regulators, and power management circuits, which are well known in the art and, therefore,
will not be described further herein. The bus interface provides the interface. Transceiver
1810 may be a number of elements, including a transmitter and a transceiver, units
for communicating with various other devices over a transmission medium. The processor
1800 is responsible for managing the bus architecture and general processing, and
the memory 1820 may store data used by the processor 1800 in performing operations.
[0205] The processor 1800 is responsible for managing the bus architecture and general processing,
and the memory 1820 may store data used by the processor 1800 in performing operations.
[0206] The processor 1800 is also used to read the program, and perform the following steps:
authenticating the terminal according to the fourth request to obtain the first authentication
information.
[0207] The processor 1800 is also used to read the program, and perform the following steps:
sending the first authentication information to the UDM, so that the UDM generates
edge computing authorization information of the terminal.
[0208] The processor 1800 is also used to read the program, and perform the following steps:
authenticating the terminal according to the fourth request, and obtaining an authentication
result;
sending the authentication result to the UDM, so that the UDM can verify the edge
computing capability of the terminal according to the authentication result and the
pre-stored edge computing service capability information of the terminal, obtain the
first authentication information, and generate edge computing authorization information
of the terminal.
[0209] The processor 1800 is also used to read the program, and perform the following steps:
Obtaining the information of the first network element from the UDM.
[0210] The device provided by the embodiment of the present disclosure can execute the above
method embodiments, and the implementation principles and technical effects thereof
are similar, and details are not described herein again in this embodiment.
[0211] As shown in FIG. 19, the information processing device according to the embodiment
of the present disclosure, applied to UDM, includes: a processor 1900, configured
to read a program in a memory 1920, and execute the following processes:
obtaining first authentication information of a terminal and edge computing authorization
information;
sending the authentication information to the first network element; and sending the
edge computing authorization information to the second network element. The transceiver
1910 is used to receive and transmit data under the control of the processor 1900.
[0212] As shown in FIG. 19, the bus architecture may include any number of interconnected
buses and bridges, specifically various circuits of one or more processors represented
by processor 1900 and memory represented by memory 1920 are linked together. The bus
architecture may also link together various other circuits, such as peripherals, voltage
regulators, and power management circuits, which are well known in the art and, therefore,
will not be described further herein. The bus interface provides the interface. Transceiver
1910 may be a number of elements, including a transmitter and a transceiver, units
for communicating with various other devices over a transmission medium. The processor
1900 is responsible for managing the bus architecture and general processing, and
the memory 1920 may store data used by the processor 1900 in performing operations.
[0213] The processor 1900 is responsible for managing the bus architecture and general processing,
and the memory 1920 may store data used by the processor 1900 in performing operations.
[0214] The processor 1900 is also used to read the program, and perform the following steps:
obtaining the authentication result of the terminal from the third network element
or the fourth network element, and verifying the edge computing capability of the
terminal according to the authentication result and the pre-stored edge computing
service capability information of the terminal, obtaining the first authentication
information, and generating the edge computing authorization information of the terminal;
or obtaining the first authentication information of the terminal from the third network
element or the fourth network element, and generating edge computing authorization
information of the terminal; or
obtaining the first authentication information preconfigured in the UDM.
[0215] The processor 1900 is also used to read the program, and perform the following steps:
performing mutual authentication with the first network element.
[0216] The processor 1900 is also used to read the program, and perform the following steps:
pre-configuring subscription information of the terminal.
[0217] The device provided by the embodiment of the present disclosure can execute the above
method embodiments, and the implementation principles and technical effects thereof
are similar, and details are not described herein again in this embodiment.
[0218] The embodiments of the present disclosure also provide an information processing
device, which is applied to a terminal. As shown in FIG. 20, the terminal according
to the embodiment of the present disclosure includes: a processor 2000, configured
to read a program in a memory 2020, and perform the following processes:
obtaining information of a second network element from a first network element;
obtaining information of a target network element from the second network element
according to the information of the second network element;
wherein, the information of the second network element is sent by the first network
element when the authentication of the terminal is successful; the information of
the target network element is sent to the terminal when the edge calculation authorization
information of the terminal is verified by the second network element.
[0219] The transceiver 2010 is used for receiving and transmitting data under the control
of the processor 2000.
[0220] A shown in FIG. 20, the bus architecture may include any number of interconnected
buses and bridges, specifically, various circuits of one or more processors represented
by processor 2000 and memory represented by memory 2020 are linked together. The bus
architecture may also link together various other circuits, such as peripherals, voltage
regulators, and power management circuits, which are well known in the art and, therefore,
will not be described further herein. The bus interface provides the interface. Transceiver
2010 may be a number of elements, including a transmitter and a receiver, units for
communicating with various other devices over a transmission medium. For different
user equipment, the user interface 2030 may also be an interface capable of externally
connecting the required equipment, and the connected equipment includes but is not
limited to a keypad, a display, a speaker, a microphone, a joystick, and the like.
[0221] The processor 2000 is responsible for managing the bus architecture and general processing,
and the memory 2020 may store data used by the processor 2000 when performing operations.
[0222] The processor 2000 is also used to read the program, and performs the following steps:
sending a first request to the first network element, wherein the first request is
used to indicate to request an edge computing service; or
sending a fourth request to a third network element request, and the fourth request
is used to indicate to request an edge computing service.
[0223] The processor 2000 is also used to read the program, and performs the following steps:
sending a second request to the first network element, so that the first network element
authenticates the terminal according to the second request;
receiving information of the second network element sent by the first network element,
wherein the information of the second network element is sent when the terminal passes
the authentication by the first network element.
[0224] The device provided by the embodiment of the present disclosure can execute the above
method embodiments, and the implementation principles and technical effects thereof
are similar, and details are not described herein again in this embodiment. Embodiments
of the present disclosure also provide a computer-readable storage medium, where a
computer program is stored on the computer-readable storage medium. When the computer
program is executed by a processor, each process of the above information processing
method can be implemented, and the same effect can be achieved. In order to avoid
repetition, it is not repeated here. The computer-readable storage medium is, for
example, a read-only memory (ROM), a random access memory (RAM), a magnetic disk,
or an optical disk.
[0225] It should be noted that, the terms "comprising", "including" or any other variation
thereof are intended to encompass non-exclusive inclusion, such that a process, method,
object or device comprising a series of elements includes not only those elements,
but also includes other elements not expressly listed or inherent to such a process,
method, object or device. Without further limitation, an element defined by the phrase
"comprising a..." does not preclude the presence of additional identical elements
in a process, method, object or device that includes the element.
[0226] From the description of the above embodiments, those skilled in the art can clearly
understand that the methods of the above embodiments can be implemented by means of
software plus a necessary general hardware platform, and of course hardware can also
be used, but in many cases the former is better implementation. According to this
understanding, the technical solutions of the present disclosure can be embodied in
the form of software products in essence, or the parts that make contributions to
related technologies. The computer software products are stored in a storage medium
(such as ROM/RAM, magnetic disk, optical disk), including several instructions to
make a terminal (which may be a mobile phone, a computer, a server, an air conditioner,
or a network device, etc.) execute the methods described in the various embodiments
of the present disclosure.
[0227] The embodiments of the present disclosure have been described above in conjunction
with the accompanying drawings, but the present disclosure is not limited to the above-mentioned
embodiments, which are merely illustrative rather than restrictive. Under the inspiration
of the present disclosure, many forms can be made without departing from the scope
of the present disclosure and the protection scope of the claims without departing
from the scope of the present disclosure and the protection scope of the claims, which
shall fall within the protection of the present disclosure.
1. An information processing method, applied to a first network element, comprising:
obtaining first authentication information for a terminal; and
in the case of determining that authentication of the terminal is successful according
to the first authentication information, sending information of a second network element
to the terminal, so that the terminal obtains information of a target network element
from the second network element, the information of the target network element is
sent by the second network element to the terminal when edge computing authorization
information of the terminal is verified, and the target network element is used to
provide an edge computing service for the terminal.
2. The method according to claim 1, wherein the obtaining first authentication information
for the terminal comprises:
obtaining the first authentication information from a unified data management entity
(UDM);
wherein, the first authentication information is obtained after the terminal is authenticated
by a third network element located in a 3GPP network and stored in the UDM; or, the
first authentication information is obtained after the UDM receives an authentication
result of the terminal generated by the third network element located in the 3GPP
network and performs verification on edge computing service capability of the terminal
according to the authentication result; or, the first authentication information is
obtained after the terminal is authenticated by a fourth network element and stored
in the UDM, or, the first authentication information is obtained after the UDM receives
an authentication result of the terminal generated by the fourth network element and
performs verification on the edge computing service capability of the terminal according
to the authentication result; or the first authentication information is obtained
after the terminal is authenticated by an authentication network element in a DN and
stored in the UDM or, the first authentication information is obtained after the UDM
receives an authentication result of the terminal generated by the authentication
network element in the DN and performs verification on the edge computing service
capability of the terminal according to the authentication result.
3. The method according to claim 1, wherein before the obtaining first authentication
information for the terminal, the method further comprises:
receiving a first request sent by the terminal, wherein the first request is used
for requesting the edge computing service
4. The method according to claim 1, wherein the obtaining first authentication information
for the terminal comprises:
receiving a second request from the terminal;
authenticating the terminal according to the second request, and obtaining the first
authentication information.
5. The method according to claim 4, wherein after sending information of a second network
element to the terminal, the method further comprises:
receiving a third request from the second network element, wherein the third request
is used to verify the edge computing authorization information of the terminal;
obtaining a token according to the third request; and
sending the token to the second network element.
6. The method according to claim 2, wherein before the obtaining the first authentication
information from UDM, the method further comprises:
performing mutual authentication with the UDM.
7. An information processing method, applied to a second network element, comprising:
obtaining edge computing authorization information of a terminal;
in the case that the edge computing authorization information is verified, sending
information of a target network element to the terminal, wherein the target network
element is used to provide an edge computing service for the terminal.
8. The method according to claim 7, wherein the obtaining edge computing authorization
information of a terminal comprises:
obtaining a token of the terminal from a UDM; or,
obtaining a stored token; or,
obtaining the token of the terminal from a first network element;
wherein, the token indicates that the terminal has the ability to use the edge computing
service.
9. An information processing method, applied to a third network element, wherein the
third network element is provided in a 3GPP network, the method comprises:
receiving a fourth request from a terminal, wherein the fourth request is used to
indicate to request an edge computing service;
obtaining first authentication information according to the fourth request;
obtaining information of a first network element, and sending the information of the
first network element to the terminal, so that the terminal interacts with the first
network element, and the first network element performs authentication of the terminal
according to the first authentication information.
10. The method according to claim 9, wherein the obtaining first authentication information
according to the fourth request comprises:
authenticating the terminal according to the fourth request to obtain the first authentication
information.
11. The method according to claim 10, wherein after the authenticating the terminal according
to the fourth request to obtain the first authentication information, the method further
comprises:
sending the first authentication information to a UDM, so that the UDM generates edge
computing authorization information of the terminal.
12. The method according to claim 9, wherein the obtaining first authentication information
according to the fourth request comprises:
authenticating the terminal according to the fourth request, and obtaining an authentication
result;
sending the authentication result to the UDM, so that the UDM verifies edge computing
capability of the terminal according to the authentication result and pre-stored edge
computing service capability information of the terminal, obtains the first authentication
information, and generates edge computing authorization information of the terminal.
13. The method according to claim 9, wherein the obtaining the information of the first
network element comprises:
obtaining the information of the first network element from the UDM.
14. An information processing method, applied to a UDM, comprising:
obtaining first authentication information and edge computing authorization information
of a terminal;
sending the first authentication information to a first network element; and
sending the edge computing authorization information to a second network element.
15. The method according to claim 14, wherein the obtaining first authentication information
and edge computing authorization information of a terminal comprises:
obtaining an authentication result of the terminal from a third network element or
a fourth network element, and verifying edge computing capability of the terminal
according to the authentication result and pre-stored edge computing service capability
information of the terminal, obtaining the first authentication information, and generating
the edge computing authorization information of the terminal; or
obtaining the first authentication information of the terminal from the third network
element or the fourth network element, and generating the edge computing authorization
information of the terminal; or
obtaining the first authentication information preconfigured in the UDM.
16. The method according to claim 14, wherein before the sending the authentication information
to the first network element, the method further comprises:
performing mutual authentication with the first network element.
17. The method according to claim 14, further comprising:
pre-configuring subscription information of the terminal.
18. An information processing method, applied to a terminal, comprising:
obtaining information of a second network element from a first network element;
obtaining information of a target network element from the second network element
according to the information of the second network element;
wherein, the information of the second network element is sent by the first network
element when authentication of the terminal is successful; the information of the
target network element is sent to the terminal when edge calculation authorization
information of the terminal is verified by the second network element.
19. The method according to claim 18, wherein before the obtaining information of a second
network element from a first network element, the method further comprises:
sending a first request to the first network element, wherein the first request is
used to indicate to request an edge computing service; or
sending a fourth request to a third network element request, and the fourth request
is used to indicate to request the edge computing service.
20. The method according to claim 18, wherein the obtaining information of a second network
element from the first network element comprises:
sending a second request to the first network element, so that the first network element
authenticates the terminal according to the second request;
receiving the information of the second network element sent by the first network
element, wherein the information of the second network element is sent when the terminal
passes the authentication by the first network element.
21. An information processing device, applied to a first network element, comprising:
a first obtaining module, configured to obtain first authentication information for
a terminal;
a first sending module, configured to, in the case of determining that authentication
of the terminal is successful according to the first authentication information, send
information of a second network element to the terminal, so that the terminal obtains
information of a target network element from the second network element, the information
of the target network element is sent by the second network element to the terminal
when edge computing authorization information of the terminal is verified, and the
target network element is used to provide an edge computing service for the terminal.
22. The device according to claim 21, wherein the first obtaining module is specifically
configured to obtain the first authentication information from a UDM;
wherein, the first authentication information is obtained after the terminal is authenticated
by a third network element located in a 3GPP network and stored in the UDM; or, the
first authentication information is obtained after the UDM receives an authentication
result of the terminal generated by the third network element located in the 3GPP
network and performs verification on edge computing service capability of the terminal
according to the authentication result; or, the first authentication information is
obtained after the terminal is authenticated by a fourth network element and stored
in the UDM, or, the first authentication information is obtained after the UDM receives
an authentication result of the terminal generated by the fourth network element and
performs verification on the edge computing service capability of the terminal according
to the authentication result; or the first authentication information is obtained
after the terminal is authenticated by an authentication network element in a DN and
stored in the UDM or, the first authentication information is obtained after the UDM
receives an authentication result of the terminal generated by the authentication
network element in the DN and performs verification on the edge computing service
capability of the terminal according to the authentication result.
23. An information processing device, applied to a second network element, comprising:
a first obtaining module, configured to obtain edge computing authorization information
of a terminal;
a first sending module, configured to, in the case that the edge computing authorization
information is verified, send information of a target network element to the terminal,
wherein the target network element is used to provide an edge computing service for
the terminal.
24. The device according to claim 23, wherein the first obtaining module is specifically
configured to obtain a token of the terminal from a UDM; or, obtain a stored token;
or, obtain the token of the terminal from a first network element; wherein, the token
indicates that the terminal has the ability to use the edge computing service.
25. An information processing device, applied to a third network element, wherein the
third network element is provided in a 3GPP network, comprising:
a receiving module, configured to receive a fourth request from a terminal, wherein
the fourth request is used to indicate to request an edge computing service;
a first obtaining module, configured to obtain first authentication information according
to the fourth request;
a second obtaining module, configured to obtain information of a first network element,
and send the information of the first network element to the terminal, so that the
terminal interacts with the first network element, and the first network element performs
authentication of the terminal according to the first authentication information.
26. The device according to claim 25, wherein the first obtaining module is specifically
configured to authenticate the terminal according to the fourth request to obtain
the first authentication information.
27. An information processing device, applied to UDM, comprising:
a first obtaining module, configured to obtain first authentication information and
edge computing authorization information of a terminal;
a first sending module, configured to send the first authentication information to
a first network element;
a second sending module, configured to send the edge computing authorization information
to a second network element.
28. The device according to claim 27, wherein the first obtaining module is specifically
configured to
obtain an authentication result of the terminal from a third network element or a
fourth network element, and verify edge computing capability of the terminal according
to the authentication result and pre-stored edge computing service capability information
of the terminal, obtain the first authentication information, and generating the edge
computing authorization information of the terminal; or
obtain the first authentication information of the terminal from the third network
element or the fourth network element, and generating the edge computing authorization
information of the terminal; or
obtain the first authentication information preconfigured in the UDM.
29. An information processing device, applied to a terminal, comprising:
a first obtaining module, configured to obtain information of a second network element
from a first network element;
a second obtaining module, configured to obtain information of a target network element
from the second network element according to the information of the second network
element;
wherein, the information of the second network element is sent by the first network
element when authentication of the terminal is successful; the information of the
target network element is sent to the terminal when edge calculation authorization
information of the terminal is verified by the second network element.
30. The device according to claim 29, wherein the first obtaining module comprises:
a sending submodule, configured to send a second request to the first network element,
so that the first network element authenticates the terminal according to the second
request;
a receiving sub-module, configured to receive the information of the second network
element sent by the first network element, wherein the information of the second network
element is sent when the terminal passes the authentication by the first network element.
31. An information processing device, applied to a first network element, comprising:
a transceiver, a memory, a processor, and a program stored in the memory and executed
by the processor; wherein the processor is configured to read the program in the memory
to perform the following processes:
obtaining first authentication information for a terminal; and
in the case of determining that authentication of the terminal is successful according
to the first authentication information, sending information of a second network element
to the terminal, so that the terminal obtains information of a target network element
from the second network element, the information of the target network element is
sent by the second network element to the terminal when edge computing authorization
information of the terminal is verified, and the target network element is used to
provide an edge computing service for the terminal.
32. The device according to claim 31, wherein the processor is further configured to read
a program in the memory to perform the following processes:
obtaining the first authentication information from a unified data management entity
(UDM);
wherein, the first authentication information is obtained after the terminal is authenticated
by a third network element located in a 3GPP network and stored in the UDM; or, the
first authentication information is obtained after the UDM receives an authentication
result of the terminal generated by the third network element located in the 3GPP
network and performs verification on edge computing service capability of the terminal
according to the authentication result; or, the first authentication information is
obtained after the terminal is authenticated by a fourth network element and stored
in the UDM, or, the first authentication information is obtained after the UDM receives
an authentication result of the terminal generated by the fourth network element and
performs verification on the edge computing service capability of the terminal according
to the authentication result; or the first authentication information is obtained
after the terminal is authenticated by an authentication network element in a DN and
stored in the UDM or, the first authentication information is obtained after the UDM
receives an authentication result of the terminal generated by the authentication
network element in the DN and performs verification on the edge computing service
capability of the terminal according to the authentication result.
33. The device according to claim 31, wherein the processor is further configured to read
the program in the memory, performing the following processes:
receiving a first request sent by the terminal, wherein the first request is used
for requesting the edge computing service
34. The device according to claim 31, wherein the processor is further configured to read
the program in the memory to perform the following processes:
receiving a second request from the terminal;
authenticating the terminal according to the second request, and obtaining the first
authentication information.
35. The device according to claim 34, wherein the processor is further configured to read
the program in the memory to perform the following processes:
receiving a third request from the second network element, wherein the third request
is used to verify the edge computing authorization information of the terminal;
obtaining a token according to the third request; and
sending the token to the second network element.
36. The device according to claim 32, wherein the processor is further configured to read
a program in the memory to perform a process of: performing mutual authentication
with the UDM.
37. An information processing device, applied to a second network element, comprising:
a transceiver, a memory, a processor, and a program stored in the memory and executed
by the processor; wherein the processor is configured to read the program in memory
to perform the following processes:
obtaining edge computing authorization information of a terminal;
in the case that the edge computing authorization information is verified, sending
information of a target network element to the terminal, wherein the target network
element is used to provide an edge computing service for the terminal.
38. The device according to claim 37, wherein the processor is further configured to read
the program in the memory to perform the following processes:
obtaining a token of the terminal from a UDM; or,
obtaining a stored token; or,
obtaining the token of the terminal from a first network element;
wherein, the token indicates that the terminal has the ability to use the edge computing
service.
39. An information processing device, applied to a third network element, wherein the
third network element is provided in a 3GPP network, comprising: a transceiver, a
memory, a processor, and a program stored in the memory and executed by the processor;
wherein the processor is configured to read the program in memory to perform the following
processes:
receiving a fourth request from a terminal, wherein the fourth request is used to
indicate to request an edge computing service;
obtaining first authentication information according to the fourth request;
obtaining information of a first network element, and sending the information of the
first network element to the terminal, so that the terminal interacts with the first
network element, and the first network element performs authentication of the terminal
according to the first authentication information.
40. The device according to claim 39, wherein the processor is further configured to read
the program in the memory to perform the following processes:
authenticating the terminal according to the fourth request to obtain the first authentication
information.
41. The device according to claim 40, wherein the processor is further configured to read
the program in the memory to perform the following processes:
sending the first authentication information to a UDM, so that the UDM generates edge
computing authorization information of the terminal.
42. The device according to claim 39, wherein the processor is further configured to read
the program in the memory to perform the following:
authenticating the terminal according to the fourth request, and obtaining an authentication
result;
sending the authentication result to the UDM, so that the UDM verifies edge computing
capability of the terminal according to the authentication result and pre-stored edge
computing service capability information of the terminal, obtains the first authentication
information, and generates edge computing authorization information of the terminal.
43. The device according to claim 39, wherein the processor is further configured to read
the program in the memory to perform the following processes:
obtaining the information of the first network element from the UDM.
44. An information processing device, applied to a UDM, comprising: a transceiver, a memory,
a processor, and a program stored in the memory and executed by the processor; wherein
the processor is configured to read the program in memory to perform the following
processes:
obtaining first authentication information and edge computing authorization information
of a terminal;
sending the first authentication information to a first network element; and
sending the edge computing authorization information to a second network element.
45. The device according to claim 44, wherein the processor is further configured to read
the program in the memory to perform the following processes:
obtaining an authentication result of the terminal from a third network element or
a fourth network element, and verifying edge computing capability of the terminal
according to the authentication result and pre-stored edge computing service capability
information of the terminal, obtaining the first authentication information, and generating
the edge computing authorization information of the terminal; or
obtaining the first authentication information of the terminal from the third network
element or the fourth network element, and generating the edge computing authorization
information of the terminal; or
obtaining the first authentication information preconfigured in the UDM.
46. The device according to claim 44, wherein the processor is further configured to read
the program in the memory to perform the following processes:
performing mutual authentication with the first network element.
47. The device according to claim 44, wherein the processor is further configured to read
the program in the memory to perform the following processes:
pre-configuring subscription information of the terminal.
48. An information processing device, applied to a terminal, comprising: a transceiver,
a memory, a processor, and a program stored in the memory and executed by the processor;
wherein the processor is configured to read the program in memory to perform the following
processes:
obtaining information of a second network element from a first network element;
obtaining information of a target network element from the second network element
according to the information of the second network element;
wherein, the information of the second network element is sent by the first network
element when authentication of the terminal is successful; the information of the
target network element is sent to the terminal when edge calculation authorization
information of the terminal is verified by the second network element.
49. The device according to claim 48, wherein the processor is further configured to read
the program in the memory to perform the following processes:
sending a first request to the first network element, wherein the first request is
used to indicate to request an edge computing service; or
sending a fourth request to a third network element request, and the fourth request
is used to indicate to request the edge computing service.
50. The device according to claim 48, wherein the processor is further configured to read
the program in the memory to perform the following processes:
sending a second request to the first network element, so that the first network element
authenticates the terminal according to the second request;
receiving the information of the second network element sent by the first network
element, wherein the information of the second network element is sent when the terminal
passes the authentication by the first network element.
51. A computer-readable storage medium for storing a computer program, wherein when the
computer program is executed by a processor, the steps in the method according to
any one of claims 1 to 6; or according to any one of 7 to 8; or according to any one
of claims 9 to 13; or according to any one of claims 14 to 17 or according to any
one of claims 18 to 20 are implemented.